3c5fa979a4
Re-organized topic hierarchy Tiny edit to restart review workflow. Squashed with Resolved index.rst conflict commit Change-Id: I13472792cb19d1e9975ac76c6954d38054d606c5 Signed-off-by: Keane Lim <keane.lim@windriver.com> Signed-off-by: MCamp859 <maryx.camp@intel.com>
1.8 KiB
1.8 KiB
Create Certificates Locally using openssl
You can use openssl
to locally create certificates suitable
for use in a lab environment.
- Create a Root Certificate and Key
Create the Root CA private key.
$ openssl genrsa -out my-root-ca-key.pem 2048
Generate the Root CA x509 certificate.
$ openssl req -x509 -new -nodes -key my-root-ca-key.pem \ -days 1024 -out my-root-ca-cert.pem -outform PEM
- Create and Sign a Server Certificate and Key.
Create the Server private key.
$ openssl genrsa -out my-server-key.pem 2048
Create the Server certificate signing request (csr).
Specify CN=<WRCP-OAM-Floating-IP> and do not specify a challenge password.
$ openssl req -new -key my-server-key.pem -out my-server.csr
Create the list.
$ echo subjectAltName = IP:<WRCP-OAM-Floating-IP>,DNS:registry.local,DNS:registry.central > extfile.cnf
Use the my-root-ca to sign the server certificate.
$ openssl x509 -req -in my-server.csr -CA my-root-ca-cert.pem \ -CAkey my-root-ca-key.pem -CAcreateserial -out my-server-cert.pem \ -days 365 -extfile extfile.cnf
Put the server certificate and key into a single file.
$ cat my-server-cert.pem my-server-key.pem > my-server.pem